Sciweavers

274 search results - page 51 / 55
» Improving vulnerability discovery models
Sort
View
140
Voted
EDBT
2006
ACM
179views Database» more  EDBT 2006»
16 years 3 months ago
TrajPattern: Mining Sequential Patterns from Imprecise Trajectories of Mobile Objects
Abstract. Mobile objects have become ubiquitous in our everyday lives, ranging from cellular phones to sensors, therefore, analyzing and mining mobile data becomes an interesting p...
Jiong Yang, Meng Hu
189
Voted
CIKM
2009
Springer
15 years 1 months ago
A tag recommendation system for folksonomy
Social bookmarking tools become more and more popular nowadays and tagging is used to organize information and allow users to recall or search the resources. Users need to type th...
Ning Zhang, Yuan Zhang, Jie Tang
ECCV
2008
Springer
15 years 5 months ago
Unsupervised Classification and Part Localization by Consistency Amplification
We present a novel method for unsupervised classification, including the discovery of a new category and precise object and part localization. Given a set of unlabelled images, som...
Leonid Karlinsky, Michael Dinerstein, Dan Levi, Sh...
115
Voted
BMCBI
2008
136views more  BMCBI 2008»
15 years 3 months ago
LOMA: A fast method to generate efficient tagged-random primers despite amplification bias of random PCR on pathogens
Background: Pathogen detection using DNA microarrays has the potential to become a fast and comprehensive diagnostics tool. However, since pathogen detection chips currently utili...
Wah-Heng Lee, Christopher W. Wong, Wan Yee Leong, ...
121
Voted
CSE
2009
IEEE
15 years 10 months ago
Inferring Unobservable Inter-community Links in Large Social Networks
Abstract—Social networks can be used to model social interactions between individuals. In many circumstances, not all interactions between individuals are observed. In such cases...
Heath Hohwald, Manuel Cebrián, Arturo Canal...